Code Signing Architecture
Posted on11 Nov 2020
Comments0
What is Code signing? In the recent past many technology firms are being targeted by hackers to tamper and corrupt the source code. These attacks... Read More
Code Signing: Top 5 Best Practices
Code Signing as a technology provides authenticity to the software codes, applications and/or files by signing the code using digital certificates and public key infrastructure.... Read More
Code Signing: Potential Threats
What is Code Signing? If you are a CISO or holding an equivalent position for any organization, one of the biggest nightmares would be failure... Read More
Code Signing: Top 5 Benefits
What is Code Signing? Code signing is the process of authenticating software code/application/program/scripts to confirm the source of origin of publisher and assure that the... Read More
What is Code Signing Certificate?
Posted on28 Feb 2020
Comments0
Introduction Code Signing is the process of applying a digital signature to a software program intended for distribution over the internet. Code signing helps to... Read More
Digital Certificates Overview – Certificates and Certificate Stores
Overview Public Key Infrastructure (PKI) is based on the principles of asymmetric cryptography: messages are encoded using the recipient’s public key, and the recipient decodes... Read More
Why Sign Code – Business Benefits
Code signing is the process of applying a digital signature to any software program that is intended for release and distribution to another party or... Read More
PII Data Encryption
What is Personally Identifiable Information (PII)? The digital age of today is powered by customer and consumer data: data is the new currency. Provided it... Read More
How Code Signing Works – A Manager’s Guide
How did code signing become important? Let’s look at three interesting trends that have emerged in software development over the last decade. One is that... Read More
Enterprise applications and PKI – Part 2
In the previous article, we explored the importance of Public Key Infrastructure (PKI) from an enterprise architecture perspective. We also saw some of the typical... Read More